Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
93d97c7037414c4e44cfedb7a7a46460N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93d97c7037414c4e44cfedb7a7a46460N.exe
Resource
win10v2004-20240709-en
General
-
Target
93d97c7037414c4e44cfedb7a7a46460N.exe
-
Size
2.7MB
-
MD5
93d97c7037414c4e44cfedb7a7a46460
-
SHA1
04721c94dc8f6c523a81ff86c3e8dfad45c510df
-
SHA256
d24b94b8442e2ab556693a6de5bbf1ad0d4799985ebdbcb8e61832616e2eb929
-
SHA512
a49ab73714351630514509c8baa725a142f5a28df063933beb63d9f20f3a3f5524548549d4f6c23de6446956b61d05b8811ada2d87d3b5e3c2f060c4aa56d73f
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LB99w4S+:+R0pI/IQlUoMPdmpSpJ4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1096 xbodsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\SysDrvXM\\xbodsys.exe" 93d97c7037414c4e44cfedb7a7a46460N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\LabZIL\\optiasys.exe" 93d97c7037414c4e44cfedb7a7a46460N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93d97c7037414c4e44cfedb7a7a46460N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbodsys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 1096 xbodsys.exe 1096 xbodsys.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 2856 93d97c7037414c4e44cfedb7a7a46460N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2856 wrote to memory of 1096 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 88 PID 2856 wrote to memory of 1096 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 88 PID 2856 wrote to memory of 1096 2856 93d97c7037414c4e44cfedb7a7a46460N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\93d97c7037414c4e44cfedb7a7a46460N.exe"C:\Users\Admin\AppData\Local\Temp\93d97c7037414c4e44cfedb7a7a46460N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\SysDrvXM\xbodsys.exeC:\SysDrvXM\xbodsys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD53c53644efbee1bc1bad283505e2067db
SHA11de3f877795a5ad0c7cec218fb5882788bab56e6
SHA2560848521ecbc350b69b251dd4c8a8b68c948bb13db10b1f86fe3037a83f2d9347
SHA51215e8b4e1747bcd7e44df91e0f6c886273371bb34751a82722790bb1b0053cf6cbf1a244ecff10762a98d505e93d1045ec974054cedcedfef0a9c0112a832b697
-
Filesize
2.7MB
MD56ccf209579aa4f552b8620c57a31464a
SHA13cb8e731aff3dfe2b46104fd0a41a28f7283d8dd
SHA2561fdcf75eeee56d5edbc44f194c0e52c3c62d39119a7b83473904d61d6f2b239a
SHA5122a001c3ed27113b21fb169a90d2f675dd1f2832c28b30572e39aa7252112208eb7cb41e0d0b28a88a87ba5050f4e03a38edd3600324857be771acb09c34cdfc9
-
Filesize
204B
MD5d9c5339d7c8f3495e415cba9d2b5cd8f
SHA11bc7ee74005b64eb1a72f841708751c17d5238e3
SHA256434705a1629df55782e8af139908c2e3b2270fe7a42fd27c217842ade84240c9
SHA5126a440330e5b8207d7004817612879a47c165b7ced0b4ad767b93668a6e7a49b47a8d7ea5bdd343ad89570c5898d412187355c3dbdeca0ba220cb9fb696bc1913